Crowdstrike
Scanner supports Crowdstrike log events that are exported by Falcon Data Replicator to S3. These logs contain information about endpoint, cloud workload, and identity data from the Crowdstrike product ecosystem. In order for Scanner to see these logs, you can configure Crowdstrike Falcon Data Replicator to publish them to S3.
Step 1: Configure Falcon Data Replicator to push to your S3 bucket
Within Crowdstrike Falcon, navigate to Support and resources and select Falcon Data Replicator. If this option is not available, you may need to talk with your Crowdstrike support team to enable Falcon Data Replicator.
First, you can configure Falcon Data Replicator to push logs to a new S3 bucket hosted in Crowdstrike's AWS account. Second, you can configure data to be replicated from Crowdstrike's S3 bucket to your own S3 bucket.
You can follow Crowdstrike's documentation about Falcon Data Replicator to accomplish this. You may also want to use Crowdstrike's FDR project on GitHub to replicate the logs to your own S3 bucket.
Step 2: Link your S3 bucket to Scanner
If you haven't done so already, link the S3 bucket containing your Crowdstrike logs to Scanner using the Linking AWS Accounts guide. This S3 bucket must be in your AWS account, not in Crowdstrike's AWS account.
Step 3: Set up an S3 Import Rule in Scanner
Within Scanner, navigate to Settings > S3 Import Rules.
Click Create Rule.
For Rule name, type a name like
my_team_name_crowdstrike_fdr_logs
.For Destination Index, choose the index where you want these logs to be searchable in Scanner.
For Status, set to Active if you want to start indexing the data immediately.
For Source Type, we recommend
crowdstrike:fdr
, but you are free to choose any name. However, out-of-the-box detection rules will expectcrowdstrike:fdr
.For AWS Account, choose the account that contains the S3 bucket containing Crowdstrike FDR logs.
For S3 Bucket, choose the S3 bucket containing Crowdstrike FDR logs.
For S3 Key Prefix, type the prefix (i.e. directory path) where the Crowdstrike FDR is writing logs.
For File type, choose JsonLines with Gzip compression.
For Timestamp extractors, under Column name, type
timestamp
. This is the field in each log event that contains the timestamp information.Click Preview rule to try it out. Check that the S3 keys you expect are appearing, and check that the log events inside are being parsed properly with the timestamp detected properly.
When you're ready, click Create.
Last updated